Reuters reviewed a product catalogue from one large contractor, which was made available on condition the vendor not be named. Scores of programs were listed. Among them was a means to turn any iPhone into a room-wide eavesdropping device. Another was a system for installing spyware on a printer or other device and moving that malware to a nearby computer via radio waves, even when the machines aren't connected to anything.
There were tools for getting access to computers or phones, tools for grabbing different categories of data, and tools for smuggling the information out again. There were versions of each for Windows, Apple and Linux machines.

Good that you told us. We have to encourage the devs
to look into it and see if there is any way to improve Puppy
if it is vulnerable in same way or worse. Due to how different it is
maybe their general ways to approach standard Linux maybe their
script has not inclided Puppy on the other hand if we are number ten
most popular they include Puppy differences in the script.

If standard Linux do this.
If Puppy Linux ask for help from operator _________________I use Google Search on Puppy Forum
not an ideal solution though

I recently visited a web site that downloaded a partial file to /tmp before I caught it.
It was an EXE file and I assume it was an attempt to infiltrate Windows.
I cannot remember the site. But the appearance of an unrequested file got to me.

Also, at a site called 4Shared, I tried to download a game tar.gz file.
The site wanted me to download and run a file downloader that happened to be an EXE file.

And when I did a search of their site for the game file name, I was told it did not exist!

So what has happened to you lately that you would consider suspicious?

So what has happened to you lately that you would consider suspicious?

1) On a Windows-7 machine, I installed the latest updates by leaving it on with that process going for the night. The next morning, the machine ran really .... really .... slow and would not get on a network no matter what I tried. I rolled back to a restore point and it was back to normal. It makes me suspect someone has figured out how to pretend to be Microsoft.

2) I have had quite a few cases of seeing something like a picture with a link that said "something.jpg" or an audio file that says it is "something.wav" that in fact leads to a something.exe. I think that is above "suspicious" and more like "obviously"

3) A while back there was a "political add" that pretended to be a local news story. It qualifies as a mind virus but is worth mentioning because it showed a method. It used one of the IP to location services and some javascript to make it always dated yesterday and be from the (your town) Express. It contained links that it invited you to click on that it claimed where to the newspaper's site but in fact took you to a server run by the political group. The same method could be used to make it appear some local folks want you to click on the thing that put the virus on your computer.

Not the full picture. You need to define "skilled attacker" and "good tools". Brute force attacks can be resisted with a password mixing case, numbers and punctuation.

In the same way anyone's property can be broken into with enough resources, I guess the same holds true for networks, but if you follow simple steps such as using a decent firewall, WPA2 encryption if possible and using strong passwords and up to date software, you have a good chance of holding out against most hackers IMHO.

If someone with the skills and tools and time wants to then sure its possible. But consider how often that will happen... The probability unless you are a political dissident, or subject to a government or corporate investigation are pretty slim.

now improving security to prevent everyday exploits from script kiddies and mail-ware that makes a whole lot of sense. Linux is pretty secure as long as precautions are taken, firewall ect..

I would sweat more on a windows box to be honest. There is a lot more development of exploits for that platform just because of the shear amount of users.

If you think 12 character password strings are bad... IBM mainframes have a maximum length of 8... and also cannot contain spaces or special characters. So from a security point of view they are far more vulnerable platforms when connected to the Internet.

The really scary one for me is wireless, there are so many potential holes and exploits that are inbuilt into the standard. I would not trust it for my sensitive data. And once the 'Internet of things' takes off you will have an even larger problem.

That said I think as time goes on and Linux gets more acceptance there will be more tools and exploits developed for the platform - look at Zeus you don't even need to have a great deal of technical skill to use it.

However I really would like to be able to password the system, I noticed I could do that with attack puppy. would be nice to have that ability with precise.

Secondly, since Linux is open source, vulnerabilities are patched relatively quickly by the community of users. Backing this up is the fact that there aren’t significant exploit packs targeting the platform. In fact, in a conversation with the malware’s sales agent, he himself suggested using email and social engineering as the infection vector.

You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot vote in polls in this forumYou cannot attach files in this forumYou can download files in this forum